01 - Introduction to Security - the importance

 1. Computer networks have huge benefits but they also cause security risks.
Fill in the blanks: By connecting computers it is possible to 
share personal data easily. 

However, it makes computers _______________________
from other people

  very able to inrease speed

  more vulnerable to interference

  unable to increase speed

  less vulnerable to interference

 2. Fill in the blanks
Anyone sharing personal information, e.g ______________ wants to be 
sure that they (the personal details) are safe and secure.

Most businesses and organisations 
employ network managers or administrators to manage the security of 
their networks

  fake name

  weather search

  bank details

  mouse click

 3. Read the excerpt below and fill in the blanks
Network security is concerned with the protection against 
access, _________ and __________ of files and directories
in a computer network system. 

Some of the most common threats to a network include 
viruses, worms, spyware, adware and identity theft.

One of the most important aspects of network security is the
multiple layers of security.

  misuse, and hacking

  people, and personell

  users and children

  searching and storing

 4. Many network security threats today are spread over the Internet. Which from the list is NOT a threat?
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Search engine optimisation (SEO)
Hacker attacks, search engine optimisation,
Denial of service attack
Data interception and theft
Identity theft
Trojan horses

  Search engine optimisation (SEO)

  Identity theft

  Denial of service attack

  Trojan horses

 5. Read the following excerpt and define an 'unstructured' attack.
The grouping of attacks
Attacks can be categorised into two different groups; 
structured and unstructured. 

1 - A structured attack is an attack by an individual who has 
advanced computer skills and intentionally targeted a specific 
group or company.

2 - An unstructured attack is an attack by an individual 
who __________________________________________________________________ 

Both types of attacks should be taken seriously because they can 
expose confidential information and create distrust between a 
company and their client

  is an unschooled but brilliant hacker, capable of causing great harm

  fully understands who they are targeting and intends to kill

  does not understand who they are targeting and only use tools that can be found easily.

  has professionally armed themselves with the art of subtly targeting the government

 6. What it all boils down to is ______. Network security is important because keeping ______ safe is important.

  privacy policies




 7. Fill in the blanks
What can happen to data?

___________data can be accessed by unauthorised individuals. 

This data can be ___________, changed, lost (which is what a company
would try to protect against). There are also legal 
obligations surrounding the storing of sensitive and persona; data 
that are important to consider 

  Confidential / stolen

  Fraudulent / bought

  Accurate / corrupted

  Subtle / found

 8. ____________ (also called ransomware) is another example of unauthorised data change.
Ransomware tries to encrypt your files so that they cannot be used unless payment is made to 'unlock' them. 





 9. A cyber attack is is an attempt to gain unauthorised access to, or control of, a computer and the network it is connected to.



 10. Network security is about keeping a network safe from:

  unauthorised access




 11. Some types of data are worth real money and so are attractive targets for _____________
Bitcoin (?) is the world's first cryptocurrency, a form of electronic cash. 

It is the first decentralized digital currency: the system was designed 
to work without a central bank or single administrator. Bitcoins are 
sent from user to user on the peer-to-peer bitcoin network directly, 
without the need for intermediaries. These transactions are verified
by network nodes through cryptography and recorded in a public distributed 
ledger called a blockchain





 12. Other examples of attractive targets for data theft would be:
1. Sales information (customer database) 
2. Inventory log (of kitchen plates) 
3. Intellectual Property, such as the latest research notes or trade notes
of a company. 

  1 only

  1 and 3

  1 and 2

  2 only

 13. Companies ought to keep certain personal details (such as passport number, NI number, and address) __________________





 14. Medical records would count as:

  open information that can be shared

  centered information that can be shared with any public network (e.g the internet)

  publicly accessible - as medical records are not personal

  personal information that must be kept secure

 15. There are legal obligations that require networks and data holders to keep data secure. Penalties can include:

  Hefty fines and even time in prison

  Torturing and Acid Burning

  Amputation of all fingers so as not to be able to type again

  Execution and Death